期刊文献+

网络入侵检测概述 被引量:5

Overview of network intrusion detection
原文传递
导出
摘要 入侵检测是目前网络安全研究的热点之一。本文试图对入侵检测的发展、特征、分类进行总结,以期获得对入侵检测技术的总体概念。
出处 《网络安全技术与应用》 2002年第5期13-16,共4页 Network Security Technology & Application
  • 相关文献

参考文献14

  • 1Susanna Breiling;Andrew Plato;Barry Shulak.ICEcap Administration Guide.
  • 2Susanna Breiling;Andrew Plato;Ted Kuster.BlackICE Defender User Guide.
  • 3Susanna Breiling;Andrew Plato;Barry Shulak.BlackICE Advanced Administration Guide.
  • 4Eugene H. Spafford;Diego Zamboni.Intrusion detection using autonomous agents.
  • 5查看详情.
  • 6Brenda McAnderson Paul Ramstedt.Intrusion Detection Technology: Today and Tomorrow.
  • 7Wayne Jansen;Peter Mell;Tom Karygiannis;Don Marks.Applying Mobile Agents to Intrusion Detection and Response.
  • 8Biswanath Mukherjee;L. Todd Heberlein;Karl N. Levitt.Network intrusion detection[J],1994(03).
  • 9Katherine Price.
  • 10Dorothy E Denning.An intrusion-detection modelIEEE Transactions on Software Engineering,1987.

二级参考文献16

  • 1徐峰,宋如顺,赵洁,刘林强.基于P2P多Agent数据融合入侵检测模型研究[J].计算机工程与应用,2004,40(17):159-161. 被引量:3
  • 2侯方明,李大兴.一种新的基于协议树的入侵检测系统的设计[J].计算机应用研究,2005,22(7):150-152. 被引量:6
  • 3Anderson J P.Computer Security Threat Monitoring and surveillance[R].[s.l.]:James P Anderson Co.,1980.
  • 4Zaki M,Sobh T S.Attack abstraction using a multi-agent system for intrusion detection[J].Journal of Intelligent &Fuzzy Systems,2005,16:141-150.
  • 5Staniford-Chen S,Tung B,Schnackenberg D.The common intrusion detection framework(CIDF)[C]//The 1 st Irformation Survivability Workshop.Orlando,FL,USA:[s.n.],1998.
  • 6Staniford-Chen S,Cheung S,Crawford R,et al.GrIDS-Agraph based intrusion detection system for large networks[C]//The 19th National Information Systems Security Conference (NISSC).Baltimore,MD,USA:[s.n.],1996:361-370.
  • 7Maniyan B J S,Garcia-Fernandez J O,Lsacoff D,et al.Architecture for intrusion detection using autonomous agents[R/OL].COAST Laboratory,Purdue University,COAST Tech Rep:9805,1998.http://www.cerias.purdue.edu/homes/aafid/docs/tr9805.pdf.
  • 8Porras P A,Neumann P G.EMERALD:Event monitoring enabling responses to anomalous live disturbances[C]//The 20th National Information Systens Security Conf (NISSC).Baltimore,MD,USA:[s.n.].1997:353-365.
  • 9Bace R,Mell P.Intrusion Detection Systems[EB/OL].2001.http://linuxsecurity.org/resource_ files/intrusion_ detection/sp800-31.pdf.
  • 10Kruegel C,Toth T.Distributed Pattern Detection for Intrusion Detection[EB/OL].2002-04.http://www.irfosys.tuwien.ac.at/Staff/tt/publications/Distributd_ Pattern_ Detection_ for_ Intrusion.Detection.pdf.

共引文献623

同被引文献25

  • 1刘欣然.网络攻击分类技术综述[J].通信学报,2004,25(7):30-36. 被引量:36
  • 2徐峰,宋如顺,赵洁,刘林强.基于P2P多Agent数据融合入侵检测模型研究[J].计算机工程与应用,2004,40(17):159-161. 被引量:3
  • 3侯方明,李大兴.一种新的基于协议树的入侵检测系统的设计[J].计算机应用研究,2005,22(7):150-152. 被引量:6
  • 4孙健,王韬,李东强.病毒防护技术的研究[J].科学技术与工程,2005,5(21):1648-1650. 被引量:27
  • 5Anderson J P.Computer Security Threat Monitoring and surveillance[R].[s.l.]:James P Anderson Co.,1980.
  • 6Zaki M,Sobh T S.Attack abstraction using a multi-agent system for intrusion detection[J].Journal of Intelligent &Fuzzy Systems,2005,16:141-150.
  • 7Staniford-Chen S,Tung B,Schnackenberg D.The common intrusion detection framework(CIDF)[C]//The 1 st Irformation Survivability Workshop.Orlando,FL,USA:[s.n.],1998.
  • 8Staniford-Chen S,Cheung S,Crawford R,et al.GrIDS-Agraph based intrusion detection system for large networks[C]//The 19th National Information Systems Security Conference (NISSC).Baltimore,MD,USA:[s.n.],1996:361-370.
  • 9Maniyan B J S,Garcia-Fernandez J O,Lsacoff D,et al.Architecture for intrusion detection using autonomous agents[R/OL].COAST Laboratory,Purdue University,COAST Tech Rep:9805,1998.http://www.cerias.purdue.edu/homes/aafid/docs/tr9805.pdf.
  • 10Porras P A,Neumann P G.EMERALD:Event monitoring enabling responses to anomalous live disturbances[C]//The 20th National Information Systens Security Conf (NISSC).Baltimore,MD,USA:[s.n.].1997:353-365.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部